EP1416449A2 - Module de sécurité et méthode pour effectuer des transactions électroniques confidentielles - Google Patents

Module de sécurité et méthode pour effectuer des transactions électroniques confidentielles Download PDF

Info

Publication number
EP1416449A2
EP1416449A2 EP03024802A EP03024802A EP1416449A2 EP 1416449 A2 EP1416449 A2 EP 1416449A2 EP 03024802 A EP03024802 A EP 03024802A EP 03024802 A EP03024802 A EP 03024802A EP 1416449 A2 EP1416449 A2 EP 1416449A2
Authority
EP
European Patent Office
Prior art keywords
user terminal
data
security module
security
confidential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP03024802A
Other languages
German (de)
English (en)
Other versions
EP1416449A3 (fr
Inventor
Thomas Kuhn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP1416449A2 publication Critical patent/EP1416449A2/fr
Publication of EP1416449A3 publication Critical patent/EP1416449A3/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07766Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement
    • G06K19/07769Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement the further communication means being a galvanic interface, e.g. hybrid or mixed smart cards having a contact and a non-contact interface
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0833Card having specific functional components
    • G07F7/084Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • G07F7/0886Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system

Definitions

  • the invention relates to a security module, in particular a chip card, as well as a procedure for carrying out confidential electronic transactions.
  • chip cards used in many areas of everyday life, for example to make calls or to carry out Money transactions. It is here a variety of chip card types are known. The easiest of these cards is the so-called memory chip card, which is exclusive Contains memory chips in the form of a ROM or EPROM. Memory chip cards are ideal if only a small one Amount of information is needed and no high security requirements be put.
  • security modules in the form of processor chip cards used which a microprocessor and a selection of different volatile and non-volatile Have storage areas.
  • processor chip cards used which a microprocessor and a selection of different volatile and non-volatile Have storage areas.
  • Such cards can be highly confidential Data using the microprocessor on the Chip card, for example, encrypted or decrypted or be electronically signed or verified.
  • supersmart cards which on the card in addition to a processor also a keyboard and display that have a built-in electrical Power source are fed.
  • This card type is the security of the card transactions carried out since inputs and outputs are not via external devices, e.g. manipulable public terminals, must be done.
  • the Supersmartcards have a high security standard on, however, they are not very user-friendly because all security-relevant data on a very small keyboard must be entered on the card and the display of confidential data over a small, difficult to read Display on the card is done. Furthermore, such cards not be used at terminals where the chip card while performing electronic transactions in the terminal remains plugged in, because then the keyboard on the Chip card is no longer usable. In addition, there are Maps due to the integrated display and the integrated Keyboard expensive. The user also adds the Supersmartcard in some transactions or applications his hand so that any manipulations are carried out can be.
  • the object of the invention is therefore a security module as well as a procedure for performing confidential to create electronic transactions that are secure Transfer of confidential data with high usability guarantee.
  • the security module which is in particular is a chip card, comprises a first connection means for data communication with a data processing device and a second connection means for data communication with a user terminal, being between a trust relationship between the user terminal and the security module consists. It also includes the security module a control device for controlling the data communication between the user terminal and the data processing device, the control device being configured in this way is that during electronic transactions Data with confidential and / or protected content from the User terminal to the second connection means and / or from the second connection means to the user terminal become.
  • a security module makes confidential Transfer data between devices, usually are in the personal possession of the user and which are due to your trusting relationship a secure data transfer guarantee.
  • the security module represents in particular a modification of the Supersmartcard, with confidential data now not on the card itself can be entered or displayed, but a user terminal is used. This will make usability easier significantly improved since the display and input of data on the user terminal much easier is as on a smart card. Furthermore, suitable for any situation any different user devices for Input and output can be used.
  • the first connecting means provided on the security module it is preferably a contact means, which is a wired and / or contact Communication with the data processing device enables.
  • the second connecting means is preferably around a unit, in particular a radio unit, for wireless communication with the user terminal, the User terminal any mobile device, in particular can be a mobile device.
  • the control device provided on the security module is preferably a microprocessor that controls the Data transfer takes over. Furthermore, the control device preferably set up such that during the electronic Transactions the data communication from the second Connection means to the user terminal and / or vice versa runs through a suitable security protocol. With this Security protocol can be, for example, Bluetooth act. This is a particularly secure data transmission guaranteed.
  • control device designed in such a way that during electronic transactions a security protocol between the user terminal and the second connection means is used, the security protocol to authenticate the trust relationship between the user terminal and the security module serves. In this way a review of the existing Relationship of trust between these two devices ensured.
  • control device designed such that during the electronic Transactions a security protocol between the user terminal and the second connection means being, with the security protocol confidentiality and / or integrity of the between the user terminal and data transmitted to the security module becomes. Integrity of the data is understood here ensuring that the data is not manipulated or have been changed.
  • control device trained such that whenever Implementation of electronic transactions a terminal, for example integrated into the reader, is used previously data for authentication of the terminal between the security module and user terminal are transmitted.
  • the User can thus first verify whether the Terminal, usually operated by someone other than that Terminal user has been set up and which one is public accessible and therefore manipulable to an authentic one Terminal acts at the desired other electronic transactions can be carried out without hesitation can.
  • control device designed such that during the electronic Transactions as data with confidential and / or protected Content transmitted by the User can be entered and / or displayed on the user terminal are.
  • This can be used, for example, when sending documents make sure that is actually the right one Document sent or signed electronically because the content of the document is usually trusted User terminal, and not on a possibly manipulated terminal is displayed.
  • the Users no longer have any secret numbers on a public one Enter the terminal that may be manipulated in this way is that inputs are saved separately and later be misused.
  • the invention also relates to a method for carrying it out of confidential electronic transactions where Data between a user terminal and a data processing device be transmitted.
  • data with confidential and / or protected content between the user terminal and a security module that with the user terminal and the data processing device is in data communication.
  • Trust relationship there is between the user terminal and the security module Trust relationship.
  • This procedure results in same way, the advantages that also with the invention Security module can be achieved.
  • the Transfer of confidential information to a security module and relocated a user terminal which is usually in the personal possession of the user and therefore trustworthy are. It is therefore prevented from being security-relevant Information on manipulable intermediate devices entered or displayed.
  • the data is preferably kept confidential and / or protected Transfer content using a security protocol.
  • the security protocol to authenticate the trust relationship between the user terminal and the security module.
  • a security protocol between the user terminal and the security module used with the security protocol the confidentiality and / or integrity between the user terminal and the security module transmitted data is ensured.
  • integrity the data is understood to mean that the data has not been manipulated or changed.
  • data are treated as confidential and / or protected content data for authentication of a terminal, being transmitted through the terminal
  • Data between the security module and the data processing device be transmitted.
  • the data with confidential and / or protected content information transmitted by the user to the user terminal can be entered and / or displayed on this.
  • the security module shown in FIG. 1 is a combination chip card 1, which contact means 2, a radio unit 3 and one integrated in the chip card and not microprocessor shown includes.
  • the microprocessor controls the data transfers via the contact means 2 and via the radio unit 3.
  • the Chip card 1 inserted into a reader 6, which in turn communicates with a central computer 7. If the The chip card is inserted into the reader Contact means 2 a mechanical contact for reading data made with the reader. Data can therefore be between the central computer 7 and the chip card become.
  • the reader 6 is part of a public terminal, for example an ATM
  • the central computer 7 is a server that provides the user desired Transactions, for example the money transactions on one ATMs controls.
  • the terminal can be any type of public accessible terminals, through the confidential Transactions are processed. For example, about the terminal will send confidential documents that by means of the chip card with an electronic signature be provided.
  • the radio unit 3 of the chip card 1 stands with a user terminal 4, which is a cellular device, in data connection. It is a contactless cellular connection, using a security protocol, such as Bluetooth, expires.
  • a user 5 can use the keyboard of the user terminal 4 Make entries or confidential information read off the device display.
  • a security protocol is authenticated, in which the chip card and the user terminal through a shared secret, which in a Initialization phase has been made known to both devices, are shaped.
  • the user terminal 4 is in the personal Owned by the user and the device is not over that Terminal and the central computer can be manipulated.
  • the first scenario concerns the payment of goods using an EC card by entering a secret number.
  • the secret number is usually through a terminal is entered with a reader, the terminal under Circumstances is not trustworthy.
  • the terminal under Circumstances is not trustworthy.
  • the secret number entered is then using a security protocol on the radio unit 3 transferred to the combi chip card 1.
  • the secret number is correct with the secret number stored on the chip card can match monetary transactions through data transfer between the chip card and the central computer via the contact means 2 and the reader 6 are performed. It will Here, the user avoided confidential data an external terminal that may be manipulated is.
  • a second scenario is the sending of confidential documents via a public terminal.
  • the public terminal may has been set up without authorization and not for implementation authorized the document transfer requested by the user is.
  • the user has with the chip card according to the invention now the possibility to check whether the set up Terminal from a target device, which in the present case the central computer 7 is authorized.
  • the chip card Transfer the code to the user terminal and display it on it.
  • the code is confidential and has been given to the user beforehand announced.
  • the Change code from transaction to transaction Is the displayed one correct? Code with the code given to the user has been agreed that the terminal is an authorized one Terminal where no unauthorized manipulation of the transferred data takes place. The user can then do this Use the terminal safely to send its documents, the combination chip card for attaching electronic signatures on the documents can serve.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)
  • Credit Cards Or The Like (AREA)
EP03024802A 2002-10-30 2003-10-30 Module de sécurité et méthode pour effectuer des transactions électroniques confidentielles Withdrawn EP1416449A3 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10250617A DE10250617A1 (de) 2002-10-30 2002-10-30 Sicherheitsmodul und Verfahren zur Durchführung von vertraulichen elektronischen Transaktionen
DE20217813U 2002-10-30

Publications (2)

Publication Number Publication Date
EP1416449A2 true EP1416449A2 (fr) 2004-05-06
EP1416449A3 EP1416449A3 (fr) 2004-05-19

Family

ID=32114977

Family Applications (1)

Application Number Title Priority Date Filing Date
EP03024802A Withdrawn EP1416449A3 (fr) 2002-10-30 2003-10-30 Module de sécurité et méthode pour effectuer des transactions électroniques confidentielles

Country Status (2)

Country Link
EP (1) EP1416449A3 (fr)
DE (1) DE10250617A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005055417A1 (de) * 2005-11-21 2007-06-06 Giesecke & Devrient Gmbh System mit einem tragbaren Datenträger und einem Endgerät
WO2009010699A2 (fr) 2007-07-12 2009-01-22 France Telecom Dispositif de traitement de donnees de type carte a puce pour un systeme de collecte de donnees
DE102007038690A1 (de) * 2007-08-15 2009-02-19 Continental Automotive Gmbh Tachograph, Anordnung und Verfahren zur Daten-Übertragung über eine benutzerfreundliche Schnittstelle

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998058509A1 (fr) * 1997-06-16 1998-12-23 Swisscom Ag Carte a puce et procede de communication entre un dispositif externe et une carte a puce
DE19841862A1 (de) * 1998-09-14 2000-03-16 Andreas W Wieland Inegration von Chipkartenfunktionen in ein mobiles Kommunikationsgerät
EP1096422A1 (fr) * 1999-10-25 2001-05-02 Swatch Ag Interface entre un lecteur à contact et un dispositif sans contact
WO2002069285A2 (fr) * 2001-02-26 2002-09-06 Legic Identsystems Ag Procede d'exploitation de supports d'identification sans contact

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1329869C (zh) * 1995-06-02 2007-08-01 皇家菲利浦电子有限公司 芯片卡
DE19604045A1 (de) * 1996-02-05 1997-08-07 Siemens Ag Vorrichtung zum Verarbeiten und Speichern von Daten
DE69838746T2 (de) * 1997-10-22 2008-10-30 Nxp B.V. Hybrid-datenträger und schaltung dafür mit vereinfachtem datenübertragungsmittel
EP1055207A1 (fr) * 1998-02-13 2000-11-29 Angewandte Digital Elektronik GmbH Procede pour commander un echange d'informations et de donnees entre un telephone mobile et un reseau de transmission de donnees
DE19855596C2 (de) * 1998-12-02 2002-10-24 Orga Kartensysteme Gmbh Tragbarer mikroprozessorgestützter Datenträger, der sowohl kontaktbehaftet als auch kontaktlos betreibbar ist
FI990695A (fi) * 1999-03-29 2000-09-30 Nokia Mobile Phones Ltd Elektronisen rahan siirtäminen
EP1269428A1 (fr) * 2000-04-04 2003-01-02 Siemens Aktiengesellschaft Utilisation d'un telephone mobile en tant que terminal d'authentification
DE10028821A1 (de) * 2000-06-10 2001-12-20 Miditec Datensysteme Gmbh Chipkarte mit Lesekennungen
US6609655B1 (en) * 2000-06-26 2003-08-26 Martha F. Harrell Smart card system for providing financial, travel, and entertainment-related services

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998058509A1 (fr) * 1997-06-16 1998-12-23 Swisscom Ag Carte a puce et procede de communication entre un dispositif externe et une carte a puce
DE19841862A1 (de) * 1998-09-14 2000-03-16 Andreas W Wieland Inegration von Chipkartenfunktionen in ein mobiles Kommunikationsgerät
EP1096422A1 (fr) * 1999-10-25 2001-05-02 Swatch Ag Interface entre un lecteur à contact et un dispositif sans contact
WO2002069285A2 (fr) * 2001-02-26 2002-09-06 Legic Identsystems Ag Procede d'exploitation de supports d'identification sans contact

Also Published As

Publication number Publication date
EP1416449A3 (fr) 2004-05-19
DE10250617A1 (de) 2004-05-19

Similar Documents

Publication Publication Date Title
EP2417550B1 (fr) Procéde d'execution d'une application à l'aide d'un support de données portable
EP3748521B1 (fr) Méthode pour lire les attributs d'un témoin d'identité
WO2001059725A1 (fr) Procede de controle de l'identite d'un utilisateur
WO2012041595A2 (fr) Procédé de lecture d'un jeton rfid, carte rfid et appareil électronique
EP3391278B1 (fr) Jeton d'identification à microcontrôleur protégé
WO1999008237A2 (fr) Procede permettant de manier sans danger des moyens de paiement electroniques et d'effectuer sans danger des transactions commerciales, et dispositif permettant d'appliquer ledit procede
EP0970447A2 (fr) Procede de transaction assistee par un reseau au moyen de cartes a puce
EP2187331A1 (fr) Clavier et procédé de transmission sécurisée de données
EP2199944A2 (fr) Procédé d'authentification d'une personne par rapport à une installation de traitement des données électronique à l'aide d'une clé électronique
EP2562670B1 (fr) Procédé d'exécution d'un accès en écriture, produit de programme informatique, système informatique et carte à puce
EP1416449A2 (fr) Module de sécurité et méthode pour effectuer des transactions électroniques confidentielles
EP3271855B1 (fr) Procédé de génération d'un certificat pour un jeton de sécurité
EP2893483B1 (fr) Procédé de personnalisation d'un élément sécurisé (se) et système informatique
EP3298526A1 (fr) Procédé de lecture d'attributs à partir d'un jeton d'identification
EP2169579A1 (fr) Procédé et dispositif d'accès à un document lisible sur machine
DE19929251C2 (de) Verfahren und Einrichtung zum Aufbau einer Kommunikation zwischen einem Anwendergerät und einem Netz
EP3186741B1 (fr) Protection d'accès pour des données étrangères dans la mémoire non volatile d'un jeton
DE10212567B4 (de) Verfahren und System zum Übertragen eines Geheimnisses an eine berechtigte Kontrollinstanz
DE102021005350A1 (de) Autorisieren einer Anwendung auf einem Sicherheitselement
EP2372599B1 (fr) Appareil électronique, système de traitement de données et procédé de lecture de données à partir d'un appareil électronique
WO2003088053A2 (fr) Procede de protection de programme

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL LT LV MK

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL LT LV MK

RIC1 Information provided on ipc code assigned before grant

Ipc: 7G 06K 19/07 B

Ipc: 7G 07F 19/00 B

Ipc: 7G 07F 7/10 A

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20041120